Search Results - (( data application server algorithm ) OR ( java location based algorithm ))
Search alternatives:
- application server »
- data application »
- server algorithm »
- java »
-
1
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
2
A technique of dispatching algorithms for web-server cluster
Published 2011Get full text
Working Paper -
3
-
4
Mobile application design for protecting the data in cloud using enhanced technique of encryption
Published 2024journal::journal article -
5
Load balancing and server consolidation in cloud computing environments: a meta-study
Published 2019“…Load balancing with server consolidation enriches the exploitation of resource utilization and can enhance Quality of Service (QoS) metrics, since data-centers and their applications are increasing exponentially. …”
Get full text
Get full text
Get full text
Article -
6
Data pre-processing on web server logs for generalized association rules mining algorithm
Published 2008“…Since the pre-processing is tedious process, it depending on the algorithm and purposes of the applications.…”
Get full text
Get full text
Article -
7
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…The cloud paradigm has arisen due to a rapid growth in applications and data sizes. Even though cloud computing servers and resources may seem unlimited, this is not true, as increased server usage leads to increased energy consumption and carbon emissions. …”
Get full text
Get full text
Thesis -
8
-
9
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
10
-
11
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
12
On protecting data storage in mobile cloud computing paradigm
Published 2014Get full text
Get full text
Get full text
Article -
13
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
14
Smart grid: Bio-inspired algorithms energy distributions for data centers
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
-
16
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…The server calculates the MAC of the data the same time the encryption processes the data. …”
Get full text
Get full text
Thesis -
17
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…The common cause of poor performance is due to the direct access to the server (e.g. pitiable performance of server-side applications or during burst crowds) and network infrastructure (e.g. long geographical distances, network overloads, etc.). …”
Get full text
Get full text
Article -
18
Improving response time, availability and reliability through asynchronous replication technique in cluster architecture of web server cluster
Published 2010Get full text
Get full text
Conference or Workshop Item -
19
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007Get full text
Get full text
Conference or Workshop Item -
20
